Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers you a broad overview of wireless security, so you can choose the methods and techniques that are most appropriate for your projects. You gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. You discover how to evaluate cryptography deployment impact on current wireless network architectures, and learn how to implement an effective cryptography architecture for any organization. The book offers the technical know-how you need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks. Moreover, this highly practical reference shows you how to implement an authentication technique that helps the user roam in different networks while maintaining the role symmetry of the message structure in intra domain and inter domain environments. Additionally, the book discusses the wireless application protocol (WAP), explaining how the protocol works and how to select appropriate cryptographic modules for this technology.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.